Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Insights Into Cloud Computing, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Disaster Recovery
Organizations perform risk management for their business continuity and disaster recovery plans during the business impact analysis phase. Likewise, risk is assessed quantitatively as well as qualitatively. The quantitative risk assessment incorporates a 1 to 3 scale for different aspects of risks on a particular process or business function. Moreover, the risk assessment process addresses risks based on probability, impact and criticality. The probability factor indicated historic event that may have occurred number of times in the past such as hurricanes, storms etc. However, the 9/11 attacks have changed the way risk assessment is carried out in the past. Now organizations place their disaster recovery sites in different countries for uninterrupted business operations. In order to minimize system failure for future, risk analysis is required that will identify all the critical systems on the network. It will also demonstrate the factors that may disrupt the critical system on the network. Moreover, it also includes the implementation of adequate controls in order to prevent system failures. Daily backups are required on daily basis and a mechanism is required that will check the integrity of the backup at the same time, if the backup is corrupt, new backup can be requested at the same time. It is essential to prevent the backup database also by applying adequate security measures, as database contents are highly classified. In case of a natural disaster, data must be relocated on a separate data center situated far away geographically. Furthermore, to eliminate power issues, ‘PoE’ can be implemented to minimize electric outage as it contains its own separate electric channel for the workstation and networking devices.
Social media can be utilized as a communication platform in a disaster situation. Likewise, a call tree is one of the critical components of a disaster recovery plan. Social network site can be used as an alternate channel for communication when the primary communication channel i.e. emails, mobile communication is not available, as this scenario may occur due to a catastrophic critical infrastructure failure of a region or country. Call tree criteria can be fulfilled by making a group of the critical staff for each business function on the social networking site. However, internet access or mobile communication is still required. Likewise, functional heads of each department may get a notification of a disaster declaration on a social networking platform; they can inform the relevant coordinators of respective functions accordingly by forwarding the same notification.
The questions that need to be answered by any organization having or planning a disaster recovery plan may include Sandhu, R. J. (2002):
- What are the Tech Med system backup strategies that are implemented, to secure the network services in spite of the system failure?
- What are the Database backup strategies that are implemented, to secure the network services in spite of the system failure?
- What are the electricity backup strategies that are implemented, to secure the network services?
- What are the Internet backup strategies that are implemented, to secure Internet connectivity?
The recovery point objectives for an organization can be defined as the data of any process or functions can be recovered after the disaster. For instance, finance function may need previous data up to two hours after disruption of services. Based on the recovery point objectives, the data backup frequencies are configured. Similarly, the recovery time objectives is the maximum time provided by the respective business functions to restore services required to resume operations. For instance, finance function may give a time of eight hours for restoration of services after a disaster. The technology team needs to plan their restoration service accordingly; however they need to plan the disaster recovery site accordingly. Likewise, these sites have different modes i.e. hot site, cold site, warm site, satellite etc Omar, A., Alijani, D., and Mason, R. (2011).
Today we have now moved to a new technological advancement i.e. the cloud. Cloud based services are cost effective with high system availability and reliability, however, the confidentiality of data on the cloud is still under debate. Organization can purchase Infrastructure as a Service (IaaS) for restoring their critical services in disaster situations. Similarly, Software as a Service (SaaS) can also be acquired for word processing. For instance, a new product from Microsoft Office 365 is Software as a Service (SaaS). For instance, MS office is a critical application for the finance functions, the technology team only need to establish internet connectivity at the disaster recovery site. The finance team critical members just have to reach at the disaster recovery site, login the system and start using their critical operations. Similarly, Infrastructure as a Service (IaaS) can be used by the technology team for installing all the critical applications without worrying about their availability and maintenance, as these requirements are catered by the cloud service provider. Furthermore, hybrid cloud can also be used for fulfilling multiple requirements of organization requiring complex disaster recovery scenarios with no down time at all such as Visa Inc. Ryan, W. M., & Loeffler, C. M. (2010) In addition, for data confidentiality and providing uninterrupted service, Service Level agreements and non-disclosure or confidentiality agreements must be signed off by both the parties.
References
Sandhu, R. J. (2002). Disaster recovery planning Premier Press.
Ryan, W. M., & Loeffler, C. M. (2010). Insights into cloud computing. Intellectual Property & Technology Law Journal, 22(11), 22-28.
Omar, A., Alijani, D., and Mason, R. (2011). Information technology disaster recovery plan: Case study. Academy of Strategic Management Journal, 10(2), 127-141
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee